Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Privacy Law

Vanderbilt University Law School

Series

Personal data

Publication Year

Articles 1 - 2 of 2

Full-Text Articles in Law

Protecting Research Data Of Publicly Revealing Participants, Ellen Clayton, B. A. Malin, Kyle J. Mckibbin Jan 2021

Protecting Research Data Of Publicly Revealing Participants, Ellen Clayton, B. A. Malin, Kyle J. Mckibbin

Vanderbilt Law School Faculty Publications

Biomedical researchers collect large amounts of personal data about individuals, which are frequently shared with repositories and an array of users. Typically, research data holders implement measures to protect participants’ identities and unique attributes from unauthorized disclosure. These measures, however, can be less effective if people disclose their participation in a research study, which they may do for many reasons. Even so, the people who provide these data for research often understandably expect that their privacy will be protected. We discuss the particular challenges posed by self-disclosure and identify various steps that researchers should take to protect data in these …


Policing, Databases, And Surveilance: Five Regulatory Categories, Christopher Slobogin Jan 2019

Policing, Databases, And Surveilance: Five Regulatory Categories, Christopher Slobogin

Vanderbilt Law School Faculty Publications

Databases are full of personal information that law enforcement might find useful. Government access to these databases can be divided into five categories: suspect-driven; profile-driven; event-driven; program-driven and volunteer-driven. This chapter recommends that, in addition to any restrictions imposed by the Fourth Amendment (which currently are minimal), each type of access should be subject to its own regulatory regime. Suspect-driven access should depend on justification proportionate to the intrusion. Profile-driven access should likewise abide by a proportionality principle but should also be subject to transparency, vetting, and universality restrictions. Event-driven access should be cabined by the time and place of …